System Architecture

System Architecture

7447 bookmarks
Custom sorting
Inside The Infrastructure That Microsoft Builds To Run AI
Inside The Infrastructure That Microsoft Builds To Run AI
Like the rest of the world, we have been watching Microsoft’s increasing use of foundation models as it transforms its services and software. It is hard
·nextplatform.com·
Inside The Infrastructure That Microsoft Builds To Run AI
Get More out of Machine Learning with Data Preprocessing
Get More out of Machine Learning with Data Preprocessing
Preprocessing is a crucial step in machine learning model development. Check out these developer tips to organize and prepare your data sets.
·thenewstack.io·
Get More out of Machine Learning with Data Preprocessing
Hopes and promises for open-source voice assistants
Hopes and promises for open-source voice assistants
At the end of 2022, Paulus Schoutsen declared 2023 "the year of voice" for Home Assistant, the popular open-source home-automation project that he founded nine years ago. The project's goal this year is to let users control their home with voice commands in their own language, using offline processing instead of sending data to the cloud. Offline voice control has been the holy grail of open-source home-automation systems for years. Several projects have tried and failed. But with Rhasspy's developer Mike Hansen spearheading Home Assistant's voice efforts, this time things could be different.
·lwn.net·
Hopes and promises for open-source voice assistants
AI Architecture
AI Architecture
What I’m about to say is pretty obvious to most artificial intelligence (AI) researchers, but I think others might benefit from hearing it. In general, AI systems are created by combining computer hardware, other hardware, access to data, an architecture, parameter settings, and hand-made software. Machine learning (ML) systems have relatively little hand-made software, while robotic systems have more other hardware.
·overcomingbias.com·
AI Architecture
JWTs: Connecting the Dots: Why, When and How
JWTs: Connecting the Dots: Why, When and How
Understanding the fundamentals of JSON web tokens is essential. When incorrectly configured or misused, they can give users access beyond their privileges.
·thenewstack.io·
JWTs: Connecting the Dots: Why, When and How
Taking Another Stab At Massively Parallel Data Analytics
Taking Another Stab At Massively Parallel Data Analytics
For many years, and quite a long time ago in computer time, Hadoop was seen as the best way to store and analyze mountains of unstructured data. But then
·nextplatform.com·
Taking Another Stab At Massively Parallel Data Analytics
The quantum state of a TCP port
The quantum state of a TCP port
If I navigate to https://blog.cloudflare.com/, my browser will connect to a remote TCP address from the local IP address assigned to my machine, and a randomly chosen local TCP port. What happens if I then decide to head to another site?
·blog.cloudflare.com·
The quantum state of a TCP port
Swift Codable Protocol: An Introduction
Swift Codable Protocol: An Introduction
The Swift programming language is known for its easy-to-use and efficient syntax. One of its most powerful features is the Codable…
·roman-zu.medium.com·
Swift Codable Protocol: An Introduction
Cybersecurity Math
Cybersecurity Math
CM.1 How you can use math to reconcile cybersecurity
·medium.com·
Cybersecurity Math
cr.yp.to
cr.yp.to
·cr.yp.to·
cr.yp.to
Meta Pseudo Labels (MPL) Algorithm
Meta Pseudo Labels (MPL) Algorithm
AI-ContentLab is an artificial intelligence technical content provider, focused on delivering high-quality article, tutorials, and blog posts
·ai-contentlab.com·
Meta Pseudo Labels (MPL) Algorithm
Dropping Packets From Unikernels
Dropping Packets From Unikernels
For quite some time now ops has auto-generated firewall rules for various cloud providers such as GCP and AWS. In this tutorial we learn how to implement a network firewall in the Nanos unikernel through simple configuration.
·nanovms.com·
Dropping Packets From Unikernels
Generic iterators for BPF
Generic iterators for BPF
BPF programs destined to be loaded into the kernel are generally written in C but, increasingly, the environment in which those programs run differs significantly from the C environment. The BPF virtual machine and associated verifier make a growing set of checks in an attempt to make BPF code safe to run. The proposed addition of an iterator mechanism to BPF highlights the kind of features that are being added — as well as the constraints placed on programmers by BPF.
·lwn.net·
Generic iterators for BPF
Defining DORA-Like Metrics for Security Engineering
Defining DORA-Like Metrics for Security Engineering
With operational availability now essentially publicly available, security is capable of much the same thing focusing on velocity and safety.
·thenewstack.io·
Defining DORA-Like Metrics for Security Engineering
Building a basic search experience with Postgres
Building a basic search experience with Postgres
Building search functionality in products is a common task. Many solutions exist to solve this problem already. OpenSource tools like opensearch and mellisearch are some examples that are very commonly used. Using a 3rd party tool to build a “full-text search” is a good bet if you have a lot of data (i.e. a lot of users). The goal of this post is to have a look at some in-built tools to build a minimalist search feature when your data is backed by a Postgres (or any SQL) database.
·pacenthink.io·
Building a basic search experience with Postgres
The workload-first approach to CPU innovation
The workload-first approach to CPU innovation
Sponsored Post: As in so many other aspects of life, not all compute workloads are created equal – they need a more subtle approach to getting the best
·nextplatform.com·
The workload-first approach to CPU innovation
Why Audit Logs Are Important
Why Audit Logs Are Important
Administrators and compliance teams can use audit logs to investigate user actions, spot suspect activity and adhere to regulatory frameworks.
·thenewstack.io·
Why Audit Logs Are Important
Zero-copy I/O for ublk, three different ways
Zero-copy I/O for ublk, three different ways
The ublk subsystem enables the creation of user-space block drivers that communicate with the kernel using io_uring. Drivers implemented this way show some promise with regard to performance, but there is a bottleneck in the way: copying data between the kernel and the user-space driver's address space. It is thus not surprising that there is interest in implementing zero-copy I/O for ublk. The mailing lists have recently seen three different proposals for how this could be done.
·lwn.net·
Zero-copy I/O for ublk, three different ways
Rules as code for more responsive governance
Rules as code for more responsive governance
Using rules as code to help bridge the gaps between policy creation, its implementation, and its, often unintended, effects on people was the subject of a talk by Pia Andrews on the first day of the inaugural Everything Open conference in Melbourne, Australia. She has long been exploring the space of open government, and her talk was a report on what she and others have been working on over the last seven years. Everything Open is the successor to the long-running, well-regarded linux.conf.au (LCA); Andrews (then Pia Waugh) gave the opening keynote at LCA 2017 in Hobart, Tasmania, and helped organize the 2007 event in Sydney.
·lwn.net·
Rules as code for more responsive governance